scispace - formally typeset
Search or ask a question
Conference

International Conference on Anti-counterfeiting, Security, and Identification 

About: International Conference on Anti-counterfeiting, Security, and Identification is an academic conference. The conference publishes majorly in the area(s): CMOS & Encryption. Over the lifetime, 929 publications have been published by the conference receiving 4218 citations.


Papers
More filters
Proceedings ArticleDOI
20 Aug 2009
TL;DR: Experimental evidence is provided which show that Polynomial and Radial Basis Function SVMs performs better than Linear SVM on the ORL Face Dataset when both are used with one against all classification.
Abstract: Automatic recognition of people has received much attention during the recent years due to its many applications in different fields such as law enforcement, security applications or video indexing. Face recognition is an important and very challenging technique to automatic people recognition. Up to date, there is no technique that provides a robust solution to all situations and different applications that face recognition may encounter. In general, we can make sure that performance of a face recognition system is determined by how to extract feature vector exactly and to classify them into a group accurately. It, therefore, is necessary for us to closely look at the feature extractor and classifier. In this paper, Principle Component Analysis (PCA) is used to play a key role in feature extractor and the SVMs are used to tackle the face recognition problem. Support Vector Machines (SVMs) have been recently proposed as a new classifier for pattern recognition. We illustrate the potential of SVMs on the Cambridge ORL Face database, which consists of 400 images of 40 individuals, containing quite a high degree of variability in expression, pose, and facial details. The SVMs that have been used included the Linear (LSVM), Polynomial (PSVM), and Radial Basis Function (RBFSVM) SVMs. We provide experimental evidence which show that Polynomial and Radial Basis Function (RBF) SVMs performs better than Linear SVM on the ORL Face Dataset when both are used with one against all classification. We also compared the SVMs based recognition with the standard eigenface approach using the Multi-Layer Perceptron (MLP) Classification criterion.

97 citations

Proceedings ArticleDOI
25 Nov 2008
TL;DR: A real-deployment of WSN based greenhouse management which is designed and implemented to realize modern precision agriculture and the advantages of using management strategy along wireless sensor-actor network technology for such cost-effective and environmental friendly greenhouse management are discussed.
Abstract: The wireless sensor networks (WSN) is one of the most significant technologies in the 21st century. In recent years, achievements in micro-sensor technology and low-power electronics make WSN become into realities in applications. This paper describes a real-deployment of WSN based greenhouse management which is designed and implemented to realize modern precision agriculture. The proposed system can monitor the greenhouse environments, control greenhouse equipment, and provide various and convenient services to consumers with hand-held devices such as a PDA living a farming village. This paper discusses the advantages of using management strategy along wireless sensor-actor network technology for such cost-effective and environmental friendly greenhouse management.

62 citations

Proceedings ArticleDOI
25 Nov 2008
TL;DR: A secure mobile payment model suitable for macro transactions that compromise cost, simplicity, security, and performance of transaction, with minimum number of cryptography key usages, and less encryption/decryption operations compared to other models is introduced.
Abstract: In this paper, we introduce a secure mobile payment model suitable for macro transactions that compromise cost, simplicity, security, and performance of transaction, with minimum number of cryptography key usages, and less encryption/decryption operations compared to other models. This model can use symmetric and asymmetric cryptography without the need of trusted 3rd parties or even PKI complexity. It is based on SMS as a transport channel which provides the capability to send transactions to payer not to payee; as usually done in most current payment transaction models. The payer receives a secured SMS message (invoice) waiting his/her confirmation (yes/no). Each entity in the payment system payer/payee trusts only his/her bank respectively, so the transaction will always go through trusted nodes. The payer/payee can also use any bank payment instrument (credit card, debit card, or even current account) without revealing confidential data during the payment. This model can be applied on any payment application e.g. e-check, money transfer, e-commerce, and even normal EFTPOS transactions with leverage infrastructure supporting the above mentioned payment applications.

57 citations

Proceedings ArticleDOI
25 Nov 2008
TL;DR: In representation of the large number of enterprises application, this DMES based on RFID achieves good results in reducing the WIP, shortening the production cycle, reducing paper and achieving better indicators.
Abstract: DMES (Discrete MES) is difficult to realize as process changes frequently, workshop environment is complicated, and data collection is difficult. RFID and 433 MHZ wireless communications have been used to set up the hardware platform for the design of DMES. With the object-oriented programming language, planning services procedure, communication procedure, management procedure, and interface procedure have been developed. The DMES system can meet the requirements of real-time data collecting, real-time monitoring, and job-shop scheme of automatic scheduling, paperless operation, and the timely transfer of the materials. In representation of the large number of enterprises application, this DMES based on RFID achieves good results in reducing the WIP, shortening the production cycle, reducing paper and achieving better indicators.

55 citations

Proceedings ArticleDOI
16 Apr 2007
TL;DR: This work discusses the information security technology in DNA computing, a new field of cryptography arising with DNA computing research in recent years that can realize several security technologies such as encryption, steganography, signature and authentication by using DNA molecular as information medium.
Abstract: DNA computing is a new method of simulating biomolecular structure of DNA and computing by means of molecular biology technological computation. It introduces a fire-new data structure and calculating method, providing a new way for solving the NP-complete problem. It is a new computational method by harnessing the enormous parallel computing ability and high memory density of bio-molecules, which brings potential challenges and opportunities to traditional cryptography. DNA cryptography is a new field of cryptography arising with DNA computing research in recent years. It can realize several security technologies such as encryption, steganography, signature and authentication by using DNA molecular as information medium. We firstly introduce the basic idea of DNA computing, and then discuss the information security technology in DNA computing.

51 citations

Performance
Metrics
No. of papers from the Conference in previous years
YearPapers
202235
202024
201948
201847
201740
201630